You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
181 lines
6.0 KiB
181 lines
6.0 KiB
import {
|
|
CaveatTypes,
|
|
RestrictedMethods,
|
|
} from '../../../../shared/constants/permissions';
|
|
import { getPermissionBackgroundApiMethods } from './background-api';
|
|
|
|
describe('permission background API methods', () => {
|
|
describe('addPermittedAccount', () => {
|
|
it('adds a permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).addPermittedAccount('foo.com', '0x2');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
['0x1', '0x2'],
|
|
);
|
|
});
|
|
|
|
it('throws if the specified account is already permitted', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
expect(() =>
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).addPermittedAccount('foo.com', '0x1'),
|
|
).toThrow(
|
|
`eth_accounts permission for origin "foo.com" already permits account "0x1".`,
|
|
);
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('removePermittedAccount', () => {
|
|
it('removes a permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return {
|
|
type: CaveatTypes.restrictReturnedAccounts,
|
|
value: ['0x1', '0x2'],
|
|
};
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x2');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).not.toHaveBeenCalled();
|
|
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.updateCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
['0x1'],
|
|
);
|
|
});
|
|
|
|
it('revokes the accounts permission if the removed account is the only permitted account', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return {
|
|
type: CaveatTypes.restrictReturnedAccounts,
|
|
value: ['0x1'],
|
|
};
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x1');
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.revokePermission).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
);
|
|
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
|
|
it('throws if the specified account is not permitted', () => {
|
|
const permissionController = {
|
|
getCaveat: jest.fn().mockImplementationOnce(() => {
|
|
return { type: CaveatTypes.restrictReturnedAccounts, value: ['0x1'] };
|
|
}),
|
|
revokePermission: jest.fn(),
|
|
updateCaveat: jest.fn(),
|
|
};
|
|
|
|
expect(() =>
|
|
getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).removePermittedAccount('foo.com', '0x2'),
|
|
).toThrow(
|
|
`eth_accounts permission for origin "foo.com" already does not permit account "0x2".`,
|
|
);
|
|
|
|
expect(permissionController.getCaveat).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.getCaveat).toHaveBeenCalledWith(
|
|
'foo.com',
|
|
RestrictedMethods.eth_accounts,
|
|
CaveatTypes.restrictReturnedAccounts,
|
|
);
|
|
|
|
expect(permissionController.revokePermission).not.toHaveBeenCalled();
|
|
expect(permissionController.updateCaveat).not.toHaveBeenCalled();
|
|
});
|
|
});
|
|
|
|
describe('requestAccountsPermissionWithId', () => {
|
|
it('request an accounts permission and returns the request id', async () => {
|
|
const permissionController = {
|
|
requestPermissions: jest.fn().mockImplementationOnce(async () => {
|
|
return [null, { id: 'arbitraryId' }];
|
|
}),
|
|
};
|
|
|
|
const id = await getPermissionBackgroundApiMethods(
|
|
permissionController,
|
|
).requestAccountsPermissionWithId('foo.com');
|
|
|
|
expect(permissionController.requestPermissions).toHaveBeenCalledTimes(1);
|
|
expect(permissionController.requestPermissions).toHaveBeenCalledWith(
|
|
{ origin: 'foo.com' },
|
|
{ eth_accounts: {} },
|
|
);
|
|
|
|
expect(id).toStrictEqual('arbitraryId');
|
|
});
|
|
});
|
|
});
|
|
|